Sciweavers

956 search results - page 93 / 192
» Dimensions in program synthesis
Sort
View
SP
2000
IEEE
14 years 1 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
ISLPED
2003
ACM
96views Hardware» more  ISLPED 2003»
14 years 3 months ago
Effective graph theoretic techniques for the generalized low power binding problem
This paper proposes two very fast graph theoretic heuristics for the low power binding problem given fixed number of resources and multiple architectures for the resources. First...
Azadeh Davoodi, Ankur Srivastava
EUROMICRO
2000
IEEE
14 years 2 months ago
Task Assignment and Scheduling under Memory Constraints
Many DSP and image processing embedded systems have hard memory constraints which makes it difficult to find a good task assignment and scheduling which fulfill these constrain...
Radoslaw Szymanek, Krzysztof Kuchcinski
CBSE
2010
Springer
14 years 1 months ago
Reactive Model-Based Control of Reconfiguration in the Fractal Component-Based Model
Abstract. We present a technique for designing reconfiguration controllers in the Fractal component-based framework. We obtain discrete control loops that automatically enforce saf...
Gwenaël Delaval, Éric Rutten

Publication
195views
12 years 8 months ago
Analog Genetic Encoding for the Evolution of Circuits and Networks
This paper describes a new kind of genetic representation called analog genetic encoding (AGE). The representation is aimed at the evolutionary synthesis and reverse engineering of...
Claudio Mattiussi, Dario Floreano